Sciweavers

196 search results - page 18 / 40
» A Hacking View of Access Control
Sort
View
AH
2008
Springer
14 years 4 months ago
Do Students Trust Their Open Learner Models?
Open learner models (OLM) enable users to access their learner model to view information about their understanding. Opening the learner model to the learner may increase their perc...
Norasnita Ahmad, Susan Bull
HPDC
2002
IEEE
14 years 2 months ago
Lightweight Self-Organizing Frameworks for Metacomputing
A novel component-based, service-oriented framework for distributed metacomputing is described. Adopting a provider-centric view of resource sharing, this project emphasizes light...
Vaidy S. Sunderam, Dawid Kurzyniec
DBSEC
2000
153views Database» more  DBSEC 2000»
13 years 11 months ago
Protecting Privacy from Continuous High-resolution Satellite Surveillance
Privacy refers to controlling the dissemination and use of personal data, including information that is knowingly disclosed, as well as data that are unintentionally revealed as a ...
Soon Ae Chun, Vijayalakshmi Atluri
SIS
2007
13 years 11 months ago
A General Approach to Securely Querying XML
Access control models for XML data can be classified in two major categories: node filtering and query rewriting systems. The first category includes approaches that use access ...
Ernesto Damiani, Majirus Fansi, Alban Gabillon, St...
ISLPED
2006
ACM
109views Hardware» more  ISLPED 2006»
14 years 3 months ago
Power reduction of multiple disks using dynamic cache resizing and speed control
This paper presents an energy-conservation method for multiple disks and their cache memory. Our method periodically resizes the cache memory and controls the rotation speeds unde...
Le Cai, Yung-Hsiang Lu